Le 7 févr. 2013 à 12:08, Emmanuel Thierry <emmanuel.thie...@telecom-bretagne.eu> a écrit :
> Hello, > > Le 7 févr. 2013 à 11:49, Steffen Klassert <steffen.klass...@secunet.com> a > écrit : > >> On Wed, Feb 06, 2013 at 02:53:48PM +0100, Emmanuel Thierry wrote: >>> >>> Le 6 févr. 2013 à 14:14, jamal a écrit : >>> >>>> >>>> On 13-02-05 03:12 AM, Steffen Klassert wrote: >>>>>> For example, executing the below commands in that order succeed: >>>>>> ip -6 xfrm policy flush >>>>>> ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out mark 1 >>>>>> mask 0xffffffff >>>>>> ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out >>>>> The policy with mark 1 is the first we find. The policy passes the >>>>> mark check and if the flow matches the selectors, we use this policy. >>>>> >>>>>> But it fails in the reverse order: >>>>>> ip -6 xfrm policy flush >>>>>> ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out >>>>>> ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out mark 1 >>>>>> mask 0xffffffff >>>>>> RTNETLINK answers: File exists >>>>> With this scenario, we would find the policy with mark and mask 0 first. >>>>> This policy passes the mark check too. So we would use this policy if the >>>>> flow matches the selectors, but the flow asked for a policy with mark 1. >>>> >>>> I think the intent Romain is expressing is reasonable and should resolved >>>> at >>>> insertion time(xfrm_policy_insert()). >>>> i.e even though the policy (such as mark=1) is inserted afterwards, at >>>> insertion time if it proves it is more specific and not duplicate, it >>>> should be >>>> inserted ahead of the mark=0. >>>> The runtime check will work then. >>> >>> Actually, we didn't think about this problem since we work with priorities, >>> putting the default policy (without a mark) at a minor priority than the >>> marked one. >>> Your remark makes clearer the ideas behind the design of XFRM, but this >>> leads to an interesting concern. If on policy insertion, the policy were >>> inserted depending on the accuracy of the mark (the more the mask is >>> specific, the more the mark must be put at the beginning of the list), how >>> would we decide which is the more specific between these ones ? >>> >>> ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out mark >>> 0x00000001 mask 0x00000005 >>> >>> ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out mark >>> 0x00000001 mask 0x00000003 >>> >> >> We can't decide on the order of these two policies, so we should not >> allow to insert both. At least not if the have the same priority, >> but we could insert both if they have different priorities. >> >> Would the patch below meet your requirements? >> >> --- >> net/xfrm/xfrm_policy.c | 18 ++++++++++++++++-- >> 1 files changed, 16 insertions(+), 2 deletions(-) >> >> diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c >> index 6c9aa64..b169a69 100644 >> --- a/net/xfrm/xfrm_policy.c >> +++ b/net/xfrm/xfrm_policy.c >> @@ -562,6 +562,21 @@ static inline int selector_cmp(struct xfrm_selector >> *s1, struct xfrm_selector *s >> return 0; >> } >> >> +static bool xfrm_mark_match(struct xfrm_policy *policy, >> + struct xfrm_policy *pol) >> +{ >> + u32 mark = policy->mark.v & policy->mark.m; >> + >> + if (policy->mark.v == pol->mark.v && policy->mark.m == pol->mark.m) >> + return true; >> + >> + if ((mark & pol->mark.m) == pol->mark.v && >> + policy->priority == pol->priority) >> + return true; >> + >> + return false; >> +} >> + >> int xfrm_policy_insert(int dir, struct xfrm_policy *policy, int excl) >> { >> struct net *net = xp_net(policy); >> @@ -569,7 +584,6 @@ int xfrm_policy_insert(int dir, struct xfrm_policy >> *policy, int excl) >> struct xfrm_policy *delpol; >> struct hlist_head *chain; >> struct hlist_node *entry, *newpos; >> - u32 mark = policy->mark.v & policy->mark.m; >> >> write_lock_bh(&xfrm_policy_lock); >> chain = policy_hash_bysel(net, &policy->selector, policy->family, dir); >> @@ -578,7 +592,7 @@ int xfrm_policy_insert(int dir, struct xfrm_policy >> *policy, int excl) >> hlist_for_each_entry(pol, entry, chain, bydst) { >> if (pol->type == policy->type && >> !selector_cmp(&pol->selector, &policy->selector) && >> - (mark & pol->mark.m) == pol->mark.v && >> + xfrm_mark_match(policy, pol) && >> xfrm_sec_ctx_match(pol->security, policy->security) && >> !WARN_ON(delpol)) { >> if (excl) { >> -- >> 1.7.2.5 >> > > This is a nice idea, however you keep the insertion asymmetric. The usage of > xfrm marks in non-conflicting cases will be made possible, but it stays > disturbing for a user as the initial example will still have the same > behavior: > * Inserting the marked one then the unmarked will succeed > * Inserting the unmarked then the marked one will fail > This gives to the user the feeling of an indeterministic behavior of the xfrm > module. > > On the base of your patch, i'd propose to make it symmetric (handmade patch > below). > > Best regards > Emmanuel Thierry Excuse the problem of logic, i sent it too quickly, here is the correct proposal: --- a/net/xfrm/xfrm_policy.c +++ b/net/xfrm/xfrm_policy.c static bool xfrm_mark_match(struct xfrm_policy *policy, struct xfrm_policy *pol) { u32 mark = policy->mark.v & policy->mark.m; + u32 mark2 = pol->mark.v & pol->mark.m; if (policy->mark.v == pol->mark.v && policy->mark.m == pol->mark.m) return true; - if ((mark & pol->mark.m) == pol->mark.v && + if (((mark & pol->mark.m) == pol->mark.v || + (mark2 & policy->mark.m) == policy->mark.v) && policy->priority == pol->priority) return true; return false; } -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/